Robert A Hullinger
Examiner (ID: 12417)
Most Active Art Unit | 2825 |
Art Unit(s) | 2813, 2825 |
Total Applications | 24 |
Issued Applications | 24 |
Pending Applications | 0 |
Abandoned Applications | 0 |
Applications
Application number | Title of the application | Filing Date | Status |
---|---|---|---|
Array
(
[id] => 7991131
[patent_doc_number] => 08077870
[patent_country] => US
[patent_kind] => B2
[patent_issue_date] => 2011-12-13
[patent_title] => 'Cryptographic key split binder for use with tagged data elements'
[patent_app_type] => utility
[patent_app_number] => 12/906906
[patent_app_country] => US
[patent_app_date] => 2010-10-18
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 4
[patent_figures_cnt] => 5
[patent_no_of_words] => 10770
[patent_no_of_claims] => 20
[patent_no_of_ind_claims] => 2
[patent_words_short_claim] => 88
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => patent
[pdf_file] => patents/08/077/08077870.pdf
[firstpage_image] =>[orig_patent_app_number] => 12906906
[rel_patent_id] =>[rel_patent_doc_number] =>) 12/906906 | Cryptographic key split binder for use with tagged data elements | Oct 17, 2010 | Issued |
Array
(
[id] => 6154722
[patent_doc_number] => 20110023121
[patent_country] => US
[patent_kind] => A1
[patent_issue_date] => 2011-01-27
[patent_title] => 'DETECTION OF UNDESIRED COMPUTER FILES IN DAMAGED ARCHIVES'
[patent_app_type] => utility
[patent_app_number] => 12/899056
[patent_app_country] => US
[patent_app_date] => 2010-10-06
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 8
[patent_figures_cnt] => 8
[patent_no_of_words] => 7718
[patent_no_of_claims] => 22
[patent_no_of_ind_claims] => 2
[patent_words_short_claim] => 0
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => publication
[pdf_file] => publications/A1/0023/20110023121.pdf
[firstpage_image] =>[orig_patent_app_number] => 12899056
[rel_patent_id] =>[rel_patent_doc_number] =>) 12/899056 | Detection of undesired computer files in damaged archives | Oct 5, 2010 | Issued |
Array
(
[id] => 5996994
[patent_doc_number] => 20110016530
[patent_country] => US
[patent_kind] => A1
[patent_issue_date] => 2011-01-20
[patent_title] => 'DETECTION OF UNDESIRED COMPUTER FILES IN ARCHIVES'
[patent_app_type] => utility
[patent_app_number] => 12/893094
[patent_app_country] => US
[patent_app_date] => 2010-09-29
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 8
[patent_figures_cnt] => 8
[patent_no_of_words] => 7834
[patent_no_of_claims] => 21
[patent_no_of_ind_claims] => 3
[patent_words_short_claim] => 0
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => publication
[pdf_file] => publications/A1/0016/20110016530.pdf
[firstpage_image] =>[orig_patent_app_number] => 12893094
[rel_patent_id] =>[rel_patent_doc_number] =>) 12/893094 | Detection of undesired computer files in archives | Sep 28, 2010 | Issued |
Array
(
[id] => 6153705
[patent_doc_number] => 20110022846
[patent_country] => US
[patent_kind] => A1
[patent_issue_date] => 2011-01-27
[patent_title] => 'Systems and Methods for Secure Transaction Management and Electronic Rights Protection'
[patent_app_type] => utility
[patent_app_number] => 12/893901
[patent_app_country] => US
[patent_app_date] => 2010-09-29
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 147
[patent_figures_cnt] => 147
[patent_no_of_words] => 180893
[patent_no_of_claims] => 4
[patent_no_of_ind_claims] => 1
[patent_words_short_claim] => 0
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => publication
[pdf_file] => publications/A1/0022/20110022846.pdf
[firstpage_image] =>[orig_patent_app_number] => 12893901
[rel_patent_id] =>[rel_patent_doc_number] =>) 12/893901 | Systems and methods for secure transaction management and electronic rights protection | Sep 28, 2010 | Issued |
Array
(
[id] => 6032561
[patent_doc_number] => 20110081886
[patent_country] => US
[patent_kind] => A1
[patent_issue_date] => 2011-04-07
[patent_title] => 'SYSTEMS AND METHODS FOR COMMUNICATION PROTECTION'
[patent_app_type] => utility
[patent_app_number] => 12/886563
[patent_app_country] => US
[patent_app_date] => 2010-09-20
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 6
[patent_figures_cnt] => 6
[patent_no_of_words] => 6201
[patent_no_of_claims] => 23
[patent_no_of_ind_claims] => 3
[patent_words_short_claim] => 0
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => publication
[pdf_file] => publications/A1/0081/20110081886.pdf
[firstpage_image] =>[orig_patent_app_number] => 12886563
[rel_patent_id] =>[rel_patent_doc_number] =>) 12/886563 | SYSTEMS AND METHODS FOR COMMUNICATION PROTECTION | Sep 19, 2010 | Abandoned |
Array
(
[id] => 8273390
[patent_doc_number] => 08214914
[patent_country] => US
[patent_kind] => B2
[patent_issue_date] => 2012-07-03
[patent_title] => 'Securing wakeup network events'
[patent_app_type] => utility
[patent_app_number] => 12/831868
[patent_app_country] => US
[patent_app_date] => 2010-07-07
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 5
[patent_figures_cnt] => 5
[patent_no_of_words] => 3850
[patent_no_of_claims] => 15
[patent_no_of_ind_claims] => 3
[patent_words_short_claim] => 69
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => patent
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 12831868
[rel_patent_id] =>[rel_patent_doc_number] =>) 12/831868 | Securing wakeup network events | Jul 6, 2010 | Issued |
Array
(
[id] => 9156775
[patent_doc_number] => 08589689
[patent_country] => US
[patent_kind] => B2
[patent_issue_date] => 2013-11-19
[patent_title] => 'Apparatus and method for over-the-air (OTA) provisioning of authentication and key agreement (AKA) credentials between two access systems'
[patent_app_type] => utility
[patent_app_number] => 12/777048
[patent_app_country] => US
[patent_app_date] => 2010-05-10
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 10
[patent_figures_cnt] => 10
[patent_no_of_words] => 17899
[patent_no_of_claims] => 54
[patent_no_of_ind_claims] => 14
[patent_words_short_claim] => 74
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => patent
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 12777048
[rel_patent_id] =>[rel_patent_doc_number] =>) 12/777048 | Apparatus and method for over-the-air (OTA) provisioning of authentication and key agreement (AKA) credentials between two access systems | May 9, 2010 | Issued |
Array
(
[id] => 6006568
[patent_doc_number] => 20110119730
[patent_country] => US
[patent_kind] => A1
[patent_issue_date] => 2011-05-19
[patent_title] => 'Enforcing Centralized Communication Policies'
[patent_app_type] => utility
[patent_app_number] => 12/774619
[patent_app_country] => US
[patent_app_date] => 2010-05-05
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 9
[patent_figures_cnt] => 9
[patent_no_of_words] => 8426
[patent_no_of_claims] => 58
[patent_no_of_ind_claims] => 3
[patent_words_short_claim] => 0
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => publication
[pdf_file] => publications/A1/0119/20110119730.pdf
[firstpage_image] =>[orig_patent_app_number] => 12774619
[rel_patent_id] =>[rel_patent_doc_number] =>) 12/774619 | Enforcing Centralized Communication Policies | May 4, 2010 | Abandoned |
Array
(
[id] => 6465763
[patent_doc_number] => 20100281527
[patent_country] => US
[patent_kind] => A1
[patent_issue_date] => 2010-11-04
[patent_title] => 'MONITORING NETWORK TRAFFIC BY USING A MONITOR DEVICE'
[patent_app_type] => utility
[patent_app_number] => 12/772960
[patent_app_country] => US
[patent_app_date] => 2010-05-03
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 5
[patent_figures_cnt] => 5
[patent_no_of_words] => 9025
[patent_no_of_claims] => 34
[patent_no_of_ind_claims] => 4
[patent_words_short_claim] => 0
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => publication
[pdf_file] => publications/A1/0281/20100281527.pdf
[firstpage_image] =>[orig_patent_app_number] => 12772960
[rel_patent_id] =>[rel_patent_doc_number] =>) 12/772960 | Monitoring network traffic by using a monitor device | May 2, 2010 | Issued |
Array
(
[id] => 8109807
[patent_doc_number] => 08156555
[patent_country] => US
[patent_kind] => B2
[patent_issue_date] => 2012-04-10
[patent_title] => 'Information processing apparatus, information processing method, information providing medium, information decryption apparatus, and information recording medium'
[patent_app_type] => utility
[patent_app_number] => 12/766414
[patent_app_country] => US
[patent_app_date] => 2010-04-23
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 10
[patent_figures_cnt] => 10
[patent_no_of_words] => 8507
[patent_no_of_claims] => 11
[patent_no_of_ind_claims] => 3
[patent_words_short_claim] => 85
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => patent
[pdf_file] => patents/08/156/08156555.pdf
[firstpage_image] =>[orig_patent_app_number] => 12766414
[rel_patent_id] =>[rel_patent_doc_number] =>) 12/766414 | Information processing apparatus, information processing method, information providing medium, information decryption apparatus, and information recording medium | Apr 22, 2010 | Issued |
Array
(
[id] => 6335926
[patent_doc_number] => 20100198838
[patent_country] => US
[patent_kind] => A1
[patent_issue_date] => 2010-08-05
[patent_title] => 'MANAGING ADD-ONS'
[patent_app_type] => utility
[patent_app_number] => 12/758243
[patent_app_country] => US
[patent_app_date] => 2010-04-12
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 11
[patent_figures_cnt] => 11
[patent_no_of_words] => 7280
[patent_no_of_claims] => 20
[patent_no_of_ind_claims] => 3
[patent_words_short_claim] => 0
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => publication
[pdf_file] => publications/A1/0198/20100198838.pdf
[firstpage_image] =>[orig_patent_app_number] => 12758243
[rel_patent_id] =>[rel_patent_doc_number] =>) 12/758243 | Managing add-ons | Apr 11, 2010 | Issued |
Array
(
[id] => 9077756
[patent_doc_number] => 08555348
[patent_country] => US
[patent_kind] => B2
[patent_issue_date] => 2013-10-08
[patent_title] => 'Hierarchical trust based posture reporting and policy enforcement'
[patent_app_type] => utility
[patent_app_number] => 12/714979
[patent_app_country] => US
[patent_app_date] => 2010-03-01
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 6
[patent_figures_cnt] => 6
[patent_no_of_words] => 9258
[patent_no_of_claims] => 18
[patent_no_of_ind_claims] => 3
[patent_words_short_claim] => 162
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => patent
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 12714979
[rel_patent_id] =>[rel_patent_doc_number] =>) 12/714979 | Hierarchical trust based posture reporting and policy enforcement | Feb 28, 2010 | Issued |
Array
(
[id] => 7566533
[patent_doc_number] => 20110286596
[patent_country] => US
[patent_kind] => A1
[patent_issue_date] => 2011-11-24
[patent_title] => 'SYSTEM AND METHODS FOR ENCRYPTION WITH AUTHENTICATION INTEGRITY'
[patent_app_type] => utility
[patent_app_number] => 13/143172
[patent_app_country] => US
[patent_app_date] => 2010-01-28
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 19
[patent_figures_cnt] => 19
[patent_no_of_words] => 17188
[patent_no_of_claims] => 25
[patent_no_of_ind_claims] => 5
[patent_words_short_claim] => 0
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => publication
[pdf_file] => publications/A1/0286/20110286596.pdf
[firstpage_image] =>[orig_patent_app_number] => 13143172
[rel_patent_id] =>[rel_patent_doc_number] =>) 13/143172 | System and methods for encryption with authentication integrity | Jan 27, 2010 | Issued |
Array
(
[id] => 8703831
[patent_doc_number] => 08397067
[patent_country] => US
[patent_kind] => B1
[patent_issue_date] => 2013-03-12
[patent_title] => 'Mechanisms and techniques for protecting intellectual property'
[patent_app_type] => utility
[patent_app_number] => 12/693223
[patent_app_country] => US
[patent_app_date] => 2010-01-25
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 5
[patent_figures_cnt] => 6
[patent_no_of_words] => 6839
[patent_no_of_claims] => 20
[patent_no_of_ind_claims] => 3
[patent_words_short_claim] => 87
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => patent
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 12693223
[rel_patent_id] =>[rel_patent_doc_number] =>) 12/693223 | Mechanisms and techniques for protecting intellectual property | Jan 24, 2010 | Issued |
Array
(
[id] => 7983041
[patent_doc_number] => 08074280
[patent_country] => US
[patent_kind] => B2
[patent_issue_date] => 2011-12-06
[patent_title] => 'Detection of undesired computer files in archives'
[patent_app_type] => utility
[patent_app_number] => 12/638951
[patent_app_country] => US
[patent_app_date] => 2009-12-15
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 7
[patent_figures_cnt] => 8
[patent_no_of_words] => 7884
[patent_no_of_claims] => 26
[patent_no_of_ind_claims] => 2
[patent_words_short_claim] => 204
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => patent
[pdf_file] => patents/08/074/08074280.pdf
[firstpage_image] =>[orig_patent_app_number] => 12638951
[rel_patent_id] =>[rel_patent_doc_number] =>) 12/638951 | Detection of undesired computer files in archives | Dec 14, 2009 | Issued |
Array
(
[id] => 9129079
[patent_doc_number] => 08577035
[patent_country] => US
[patent_kind] => B2
[patent_issue_date] => 2013-11-05
[patent_title] => 'Electronic circuit for securing data interchanges between a computer station and a network'
[patent_app_type] => utility
[patent_app_number] => 12/624949
[patent_app_country] => US
[patent_app_date] => 2009-11-24
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 3
[patent_figures_cnt] => 5
[patent_no_of_words] => 3721
[patent_no_of_claims] => 11
[patent_no_of_ind_claims] => 1
[patent_words_short_claim] => 158
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => patent
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 12624949
[rel_patent_id] =>[rel_patent_doc_number] =>) 12/624949 | Electronic circuit for securing data interchanges between a computer station and a network | Nov 23, 2009 | Issued |
Array
(
[id] => 6234296
[patent_doc_number] => 20100185859
[patent_country] => US
[patent_kind] => A1
[patent_issue_date] => 2010-07-22
[patent_title] => 'SOFTWARE UPDATE SYSTEM, MANAGEMENT APPARATUS, RECORDING MEDIUM, AND INTEGRATED CIRCUIT'
[patent_app_type] => utility
[patent_app_number] => 12/624739
[patent_app_country] => US
[patent_app_date] => 2009-11-24
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 62
[patent_figures_cnt] => 62
[patent_no_of_words] => 41993
[patent_no_of_claims] => 20
[patent_no_of_ind_claims] => 4
[patent_words_short_claim] => 0
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => publication
[pdf_file] => publications/A1/0185/20100185859.pdf
[firstpage_image] =>[orig_patent_app_number] => 12624739
[rel_patent_id] =>[rel_patent_doc_number] =>) 12/624739 | Software update system, management apparatus, recording medium, and integrated circuit | Nov 23, 2009 | Issued |
Array
(
[id] => 8438467
[patent_doc_number] => 08286253
[patent_country] => US
[patent_kind] => B1
[patent_issue_date] => 2012-10-09
[patent_title] => 'Data leakage prevention for resource limited device'
[patent_app_type] => utility
[patent_app_number] => 12/623934
[patent_app_country] => US
[patent_app_date] => 2009-11-23
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 4
[patent_figures_cnt] => 6
[patent_no_of_words] => 5591
[patent_no_of_claims] => 20
[patent_no_of_ind_claims] => 3
[patent_words_short_claim] => 144
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => patent
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 12623934
[rel_patent_id] =>[rel_patent_doc_number] =>) 12/623934 | Data leakage prevention for resource limited device | Nov 22, 2009 | Issued |
Array
(
[id] => 8401165
[patent_doc_number] => 08271555
[patent_country] => US
[patent_kind] => B2
[patent_issue_date] => 2012-09-18
[patent_title] => 'Method and application for a reactive defense against illegal distribution of multimedia content in file sharing networks'
[patent_app_type] => utility
[patent_app_number] => 12/615332
[patent_app_country] => US
[patent_app_date] => 2009-11-10
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 10
[patent_figures_cnt] => 12
[patent_no_of_words] => 6207
[patent_no_of_claims] => 30
[patent_no_of_ind_claims] => 4
[patent_words_short_claim] => 127
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => patent
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 12615332
[rel_patent_id] =>[rel_patent_doc_number] =>) 12/615332 | Method and application for a reactive defense against illegal distribution of multimedia content in file sharing networks | Nov 9, 2009 | Issued |
Array
(
[id] => 6620964
[patent_doc_number] => 20100050266
[patent_country] => US
[patent_kind] => A1
[patent_issue_date] => 2010-02-25
[patent_title] => 'Providing Extended Memory Protection'
[patent_app_type] => utility
[patent_app_number] => 12/606408
[patent_app_country] => US
[patent_app_date] => 2009-10-27
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 7
[patent_figures_cnt] => 7
[patent_no_of_words] => 5442
[patent_no_of_claims] => 20
[patent_no_of_ind_claims] => 3
[patent_words_short_claim] => 0
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => publication
[pdf_file] => publications/A1/0050/20100050266.pdf
[firstpage_image] =>[orig_patent_app_number] => 12606408
[rel_patent_id] =>[rel_patent_doc_number] =>) 12/606408 | Providing extended memory protection | Oct 26, 2009 | Issued |